Jump to content
Slate Blackcurrant Watermelon Strawberry Orange Banana Apple Emerald Chocolate Marble
Slate Blackcurrant Watermelon Strawberry Orange Banana Apple Emerald Chocolate Marble

Leaderboard


Popular Content

Showing content with the highest reputation since 11/20/2017 in all areas

  1. 1 point
    When moving a KVM image to another server, it’s a pretty simple process. If you’re using SolusVM or Virtualizor, it makes it even easier. However, if you have a VM node which hosts openVZ containers and need to move them to a new node with different virtualization, QEMU/KVM in this case, it makes things a little more difficult. The main different between KVM and openVZ is the level of virtualization. OpenVZ is an OS level virtualization which means the hosts’ kernel is shared with guest containers inside it, you can’t use your own kernel. KVM is very different. It’s a full virtualization. The whole OS and its kernel is virtualized so you can even install an OS with its own kernel in it, like installing Windows VM inside a linux host. So let’s get on with this tutorial now that we have a little background. Please proceed at your own risk! – Converting OpenVZ to KVM box Let’s start the moving process. 1. The first step before start moving the box is installing a KVM box with the exact same OS as the openVZ container, preferably same point revision too (You will want to run yum update on both VM’s to make sure) 2. SSH into both VMs. 3. In the KVM box, or openVZ box, install mingetty. I’m using CentOS 6.2 so I use yum to install mingetty yum install mingetty 4. Edit /etc/inittab in the VM installed with mingetty vi /etc/inittab and add these lines # Run gettys in standard run levels 1:2345:respawn:/sbin/mingetty tty1 2:2345:respawn:/sbin/mingetty tty2 3:2345:respawn:/sbin/mingetty tty3 4:2345:respawn:/sbin/mingetty tty4 5:2345:respawn:/sbin/mingetty tty5 6:2345:respawn:/sbin/mingetty tty6 This will enable the machine to actually get a logon prompt. 5. Install rsync on both VMs yum install rsync 6. From the openVZ box, make a text file containing files to exclude. This will preserve settings in KVM box to make sure the VM is bootable. nano /root/exclude.txt add these lines to exclude.txt, you may customize it to your needs /boot /proc /sys /tmp /dev /var/lock /etc/fstab /etc/mtab /etc/resolv.conf /etc/conf.d/net /etc/network/interfaces /etc/networks /etc/sysconfig/network* /etc/sysconfig/hwconf /etc/sysconfig/ip6tables-config /etc/sysconfig/kernel /etc/hostname /etc/HOSTNAME /etc/hosts /etc/modprobe* /etc/modules /net /lib/modules /etc/rc.conf /usr/share/nova-agent* /usr/sbin/nova-agent* /etc/init.d/nova-agent* /etc/ips /etc/ipaddrpool /etc/ips.dnsmaster /etc/resolv.conf /etc/sysconfig/network-scripts/ifcfg-eth0 7. Now we can start to sync the OpenVZ box to the KVM box. In the openVZ box, type: rsync –exclude-from=”/root/exclude.txt” –delete –numeric-ids -avpogtStlHz -e “ssh -p ” / root@ That’s all, to make sure everything’s working, reboot the KVM box when the rsync process has completed. Once your new KVM box is up, you will have to go in there and make the IP changes to cPAnel/WHM, shoutcast, zPanel, or whichever other control panel you’re using. https://blog.webhostpython.com/2015/11/25/how-to-convertmigrate-openvz-vps-to-xenkvm/
  2. 1 point
    I am Mrs. Lauren Cruz from Los Angeles, I want to testify about Georg Bednorz Hacker blank atm cards which can withdraw money from any atm machine around the world. I was very poor before and have no job. I saw so many testimonies about how Georg Bednorz hackers send them the atm blank card and use it to collect money in any atm machine and become rich. I email them also and paid the charges and delivery cost, I was a bit scared that I won't get the card and my money won't be refunded back to me, to my greatest surprise, the ATM Card was sent to me, I have used it to get 25,000 dollars already, the maximum daily limit of the ATM Card is 5,000 dollars. Georg Bednorz Hacker is giving out the card just to help the poor. Hack and take money directly from any atm machine vault with the use of an atm programmed card which runs in automatic mode. Contact them via WhatsApp via +1 (262) 355-8285 Email: georgbednorzhackers@gmail.com
  3. 1 point
    Hello everyone, I got my programmed and blank ATM card to withdraw the maximum of 5,000 USD daily on any ATM. I am so happy about this because I got mine yesterday and I have used it to get 10,000 USD. Georg Bednorz Hackers is giving out the card just to help the poor and needy though it is illegal but it is something nice. Get yours from these Hackers today! Email: (georgbednorzhackers@gmail.com) WhatsApp or Text: +12623558285
  4. 1 point
    wherever i visited it was made quite clear upgrading CentOS 6 to CentOS 7 is not a realistically viable option https://forums.centos.org/viewtopic.php?t=69363 and OVZ6 or otherwise OpenVZ aka Virtuozzo containers lack their kernel so migrating was between hard to not possible. https://www.lowendtalk.com/discussion/149162/migrate-from-virtuozzo-to-xen-or-kvm Well, we are happy to disagree since we managed to do the Virtualization equivalent of Magellan Circumnavigation after a week of hard work: we started with OVZ container running CentOS 6.10 and cPanel / WHM 11.86 with an upgrade blocker due to COS6 being EOL since November 2020. Managed by trial and error to migrate this container to a KVM clone running same CentOS 6.10 and all files cloned 1-1 with rsync. Then we run the magnificent yet underrrated Red Hat upgrade tool in the KVM virtual machine to upgrade to CentOS 7.0.1406 and had to recreate the missing grub2 entries since grub is no more on COS7. From that point onwards we managed to properly yum update to 7.9 and finally to fix cPanel RPM issues and run a full WHM upgrade to 11.94. In short : OVZ COS6 WHM 11.86 -> KVM COS6 WHM 11.86 -> KVM COS7 WHM 1186 -> KVM COS7 WHM 11.94 and are are running now at latest version with functionality surprisingly high if not almost full identical www.forumsandmore.com
  5. 1 point
    IPS Community Suite 4.4.9 Released 12/02/2019 Key Changes Version 4.4.9 is a maintenance update to fix critical issues reported since 4.4.8. Additional Information Core Added ability to search for members based on custom profile fields with type "Checkbox Set". Improved the warning form to make it clearer when a preset action cannot be overridden. Updated PhpUserAgent to 0.14.0 for 'Edgium' support. Fixed an issue where duplicate quote/mention/embed notifications could be sent when editing content. Fixed an issue where you could submit the form to update your profile information with no date set for your birthday, resulting in your form submission being ignored. Fixed an unclear page title when searching for members. Fixed a potential issue sending digests when cron is used to run tasks. Fixed an issue with dates adjusting incorrectly when crossing over DST threshold in some areas. Fixed an issue where some administrators may not be able to manage applications in the AdminCP in some permission configurations. Fixed a MySQL 8.0.17 compatibility issue with the 4.0.0 Alpha 1 upgrade step. Fixed an issue where attachment filename text could be edited in the editor. Fixed an issue with status update pagination not appearing correctly in some cases. Fixed profile photo uploads allowing you to upload more than one file without automatically removing the previously uploaded file. Blogs Fixed an issue where draft entries submitted in private/closed clubs may not be visible by club owner or moderators. Fixed an issue where club blog entries may not be visible to global moderators/administrators when they have permission to view all club content. Forums Removed trendlines from charts in the AdminCP to reduce confusion. Commerce Fixed a situation where duplicate display names were allowed when checking out as a guest and the user was not prompted for their display name. Fixed Stripe webhooks potentially reporting an error. Fixed an issue with generating renewal invoices via the task system. Fixed an issue where custom fields may incorrectly show up when checking out as a guest while quick registration is enabled. Fixed a possible error when applying changes to subscription plans to existing purchases. Gallery Fixed a styling issue for widgets not set to show on all devices in some cases on pages. Fixed an issue where the sitemap could be stopped being rebuilt. Pages Changed categories in databases that do not allow direct record submissions to not output a "noindex" <meta> robots tag. Changed database category sitemap files to include empty categories if they contain subcategories.
  6. 1 point
    IPS Community Suite 4.4.8 Released 11/12/2019 Key Changes Version 4.4.7 is a maintenance update to fix critical issues reported since 4.4.7. Additional Information Core Upgraded CodeMirror to 5.49.0. Upgraded CKEditor to 4.13. Increased the amount of text that can be stored within an announcement. Fixed merging members creating duplicate follow records. Fixed an issue where accounts banned as a result of the spam service may be deleted automatically if email validation is enabled, allowing the user to register again. Fixed an issue embedding Twitch clips in some cases. Fixed a performance issue with Elasticsearch and posting in large topics. Fixed an issue where content items would stop showing in streams when deleting the last comment on that content item and using Elasticsearch. Fixed a CSRF error paginating through clubs after changing your view preference. Fixed floated images inside spoilers breaking out of the spoiler box. Fixed an issue with club breadcrumbs on mobile devices when the "Overview" tab is not the default tab for the club. Fixed an issue confirming guests have not reviewed an item when they have used the "post before registering" feature. Fixed an issue where the submit button on the account validation screen could be clicked multiple times, resulting in more than one confirmation email being sent. Fixed possible issue downloading the member list export on larger sites. Fixed a styling issue viewing the list of members who were not initially included in a member export. Fixed an issue where club nodes weren't shown in the node selector while creating custom streams in the ACP. Fixed a possible error in the menu manager where editing a deleted menu item would throw an exception. Fixed an issue where email addresses weren't saved for accounts created via non-default login methods when allowed domains were defined. Fixed a bug where certain email notifications triggered by guests may show incorrect verbiage in the email content. Fixed two issues where replying to Status Posts or hiding/unhiding them could fail when Elastic Search is being used. Fixed an issue saving custom chart views in the AdminCP when a lot of nodes were stored. Fixed an issue updating date ranges for custom chart views in the AdminCP in some cases. Fixed a styling issue for widgets not set to show on all devices in some cases. Fixed an issue where cancelling editing a post with a spoiler results in the spoiler no longer working. Fixed an issue where spotify links wouldn't embed. Fixed some missing friendly URLs. Fixed a niche error where a wrong message can be displayed if there is a network failure whilst browsing status updates. Fixed an issue where multiple New User Awaiting Validation notifications can be sent when using User then Admin Validation. Forums Fixed an issue where multipage topics that have been read can be marked as unread when visiting a page other than the last. Fixed a styling issue in QA forums when no rows are shown. Fixed an issue where an incorrect meta description tag may persist when navigating through the forums. Gallery Fixed an issue which made it impossible to move images into albums set to allow submissions from the public, specific members, specific groups, and club members. Fixed promote button not showing on non-lightbox Gallery image view fallback page. Commerce Fixed potential double charges if using Stripe. Fixed customer name showing as random characters in Stripe when a guest purchases something and opts to save their card on file. Fixed Hosting Error ACP Notifications causing an error when viewing the notifications page. Fixed an issue when a guest makes a donation. Fixed the missing overlay title while creating & editing an invoice note. Fixed possible timeout error when generating invoices manually in the AdminCP. Fixed an issue where purchases which wouldn't require a billing address couldn't be marked as paid. Fixed an issue where club joining fees may be shown without tax. Pages Fixed an issue previewing feed blocks in the AdminCP when restricting the feed by author. Fixed an issue where "Records" would be shown in database notification emails if categories were not being used for the database. Calendar Fixed manual iCalendar uploads requiring a venue to be specified if venues are enabled. Fixed an error importing ics files in the AdminCP if a venue is specified. Converters Added support for vBulletin 5.5.3+ conversions. Added support for XenForo 2.1.x conversions. Fixed issues with running conversions on MySQL 8.0.17 or newer. Fixed an issue converting from MyBB where PMs would not reflect the correct conversation starter. Fixed an issue where members may not be correctly assigned to groups that were added during the conversion. Fixed a bad log reference when converting from Gallery if the image is invalid. Fixed an issue where an error may be triggered when installing a new application and attempting to start a new conversion. Fixed an issue converting WordPress post thumbnails to Pages record image. Third-Party / Developer / Designer Mode Centralized the breadcrumb generation method for club nodes to reduce code duplication and ensure breadcrumb consistency. Changed `\IPS\Http\Url::ips()` to be declared as `final`, so hooks cannot override it. Fixed an issue using custom table helpers without quicksearch where the result and page counts may inadvertently get reset. Fixed an issue where cached unapproved/hidden review counts when merging content items were not adjusted properly. **You may wish to rebuild these counts in an upgrade routine within third party applications that support reviews and merging of content items.** Fixed an issue where the hidden status when creating a new review may not be set properly during creation when calling `\IPS\Content\Review::create()`. Minor code clarification where curly braces were omitted (while unnecessary, some found the code confusing to read).
  7. 1 point
  8. 1 point
    Version 7.2.5 26 Apr 2018 Changelog Version 7.1.17 26 Apr 2018 Changelog Version 7.0.30 26 Apr 2018 Changelog Version 5.6.36 26 Apr 2018 Changelog PHP Supported Versions
  9. 1 point
    ello, Please revert any modifications you have made and let us know if the steps outlined below are helpful: 1. Create the /var/cpanel/ApachePHPFPM directory: Code: mkdir /var/cpanel/ApachePHPFPM 2. Create the /var/cpanel/ApachePHPFPM/system_pool_defaults.yaml file: Code: touch /var/cpanel/ApachePHPFPM/system_pool_defaults.yaml 3. Edit /var/cpanel/ApachePHPFPM/system_pool_defaults.yaml using your preferred text editor (e.g. vi, nano) so that it looks exactly like this: Code: php_admin_value_disable_functions : passthru,system In this example, "passthru,system" are left as disabled functions. No other lines exist before or after this entry in this file. 4. Regenerate the PHP-FPM configuration files via: Code: /scripts/php_fpm_config --rebuild Thank you. https://forums.cpanel.net/threads/php-disable_functions-in-php-fpm.613903/ https://forums.cpanel.net/threads/enabling-php-fpm-forces-disable_functions.590799/#post-2391379
  10. 1 point
    κάτι ήξερα ισως και εκοβα ακομη και την 8083 by default. μεχρι τώρα δεν εχω βρει κάτι κάπου
  11. 1 point
    31st of March is World Backup Day, a global initiative that aims to get organisations and individuals to pledge to back up their data on that day. As a web host, it’s something we fully support and we’ve written this article to explain why you should join in. To give you a little more incentive, we’ve also got a couple of superb backup deals on offer which we’ll tell you about at the end of the post. If you’re one of our regular readers, you’ll know that this is not the first post we’ve written about backups – and it’s unlikely to be the last. Backing up is one of the things that people need to be constantly reminded to do. Most of us know why we should but, for some reason, we don’t always see it as a priority. Data loss is what happens to others – isn’t it? If you aren’t overly concerned about the need to backup your data, here are a few points to get you thinking. Malware vulnerability According to Sophos, over 300 million new pieces of malware are created to infect websites and computers every year. This results in 10% of all computers being infected every month and 30,000 websites being infected every single day. When viruses infect, data is lost and software is corrupted. And these infections can spread beyond just computers and websites. Viruses can be transmitted to phones, tablets, pen drives, camera cards and other storage devices – and done so unwittingly by employees and customers. Whilst antivirus software can usually protect you, the companies that make the software have to detect the malware first and then discover a way to eradicate it. Unfortunately, you can’t detect malware until it is already out there doing damage in the first place. Having a clean backup means your data isn’t lost and your business recovers far quicker and with significantly less expense. Hacking Surprisingly, most website owners think hacking is a conscious undertaking done by an individual who chooses a company to target. This leaves them to believe that no-one would be interested in hacking their organisation and so they have little to fear. “We’re a plumbers’ merchant in Hampstead Heath, nobody would want to hack us.” It doesn’t quite work like that. Hacking is very much an automated process where computer programs, not too dissimilar to Google’s search bots, scour the entire internet looking for sites which have vulnerabilities. It is these sites which are then targeted; and the actual break in is much more likely to be done using highly sophisticated software rather than by some hooded character, wearing a Salvador Dali mask, beavering away at a keyboard. Anyone who has any kind of hacking detection software, such as the WordPress Wordfence plugin, will know that even small websites have multiple attempted break-ins on a daily basis. Indeed, 66% of all attacks are on SME’s and in 2016 there is expected to be a 37% increase in the number of attacks. Whilst one of the biggest threats of hacking is that data will be stolen, there is also the risk of data being lost. Once an intruder has access to your admin panel, there is nothing they cannot do. If they wish, they can delete everything and take down your entire system. I put it somewhere…. Human error is one of the most significant causes of data loss for businesses. Hundreds of thousands of computers and phones go missing every year. Even back in 2008, a study found that 12,000 laptops were lost every week, just in US airports. If you are a small business and you keep your entire business records on your laptop, losing it can have enormous consequences: invoices, clients’ work, contact details, emails, website content, account details, logins, portfolios… all of it important information. It’s not just a matter of it potentially being stolen or accessed, if it is not backed up, it’s gone. It’s not just misplacing hardware where human error causes problems; we erroneously delete data and carelessly break our devices. There are 84,900,000 results on Google for the term ‘phone down the toilet’ and over 25 million for ‘spill water on computer’ which indicates how many people have put their data in jeopardy just by accident. And, of course, devices are prone to breaking down and hard drives to failing. A regular backup would ensure that when your device dies, the data will live on and your organisation can make a full recovery. Make your World Backup Day pledge We’d like to think that we’ve done our bit here to remind you just how important backing up your data can be and hopefully this will encourage you to support World Backup Day on 31st March by pledging to backup on that day. You can find out more about World Backup Day by watching the video below. Need an incentive? Here are our offers Hopefully, we’ve convinced you that regularly backing up your data is absolutely essential. To make things easier we have got two offers which you might be interested in. Firstly, if you buy any of our VPS, Cloud or Dedicated server packages on World Backup Day, 31st March, well give you a 25GB of backup storage, FREE for 12 months. If you don’t need a VPS, Cloud or Dedicated server package but still want a backup facility, we’re offering 25% off any backup purchased on 29th, 30th, 31st March.
  12. 1 point
    I am using rsync to recursively sync a remote folder tree that looks something like the following: /folderA/a1/cache /folderA/a1/cache/A1 /folderA/a1/cache/A2 /folderA/a1/somefolder /folderA/a1/someotherfolder /folderA/a2/somefolder/cache /folderB/cache/ /folderB/b1/somefolder/cache /folderB/b1/somefolder/yetanotherfolder/cache /folderB/b1/somefolder/yetanotherfolder/cache/B1 /folderB/b1/somefolder/yetanotherfolder/cache/B2 I don't know what the folder tree will look like and it will change over time. So what I want to be able to do is recursively rsync the above but exclude the folder "cache" and any sub folders it contains so that I ultimately end up syncing: /folderA/a1 /folderA/a1/somefolder /folderA/a1/someotherfolder /folderA/a2/somefolder /folderB/ /folderB/b1/somefolder /folderB/b1/somefolder/yetanotherfolder/ Any suggestions? >> You want the --exclude flag. For example, a local rsync: rsync -a --exclude cache/ src_folder/ target_folder/ https://unix.stackexchange.com/questions/5774/rsync-excluding-a-particular-subdirectory-and-its-children-where-the-subdirect
  13. 1 point
    https://krikienoid.github.io/flagwaver/
  14. 1 point
    It is very easy. The solution is on nixCraft, but on the comments. ## 64 bit linux ## wget https://www.rarlab.com/rar/rarlinux-x64-5.5.0.tar.gz tar -zxvf rarlinux-x64-5.5.0.tar.gz cd rar sudo cp -v rar unrar /usr/local/bin/ There’s no need to compile or anything. The binary on the tar file works out of the box. On the above example, we copy it on /usr/local/bin so it is found by default after login on our system. Other “exotic” solutions are possible, but I don’t want to make suggestions. https://bitsanddragons.wordpress.com/2018/01/09/install-rar-unrar-on-centos-7/
  15. 1 point
  16. 1 point
    https://github.com/rezasp/joomscan
  17. 1 point
  18. 1 point
    Αν και ξεφεύγει ελαφρώς από την θεματολογία του φορουμ, νομίζω ότι το παρακάτω άρθρο αξίζει να το διαβάσετε Αφορμή στάθηκαν αυτές οι φωτογραφίες Buran Space Suttle Που απεικονίζουν τις τελευταίες στιγμές του διαστημικού προγράμματος Buran: και ένα καταπληκτικό άρθρο ενός φωτογράφου που επισκέφτηκε το εγκαταλειλημένο υπόστεγο κάποια χρόνια μετά: Τhis abandoned hangar Η πλατφόρμα Buran ήταν ότι πιο προηγμένο είχε κατασκευάσει η ανθρωπότητα για την εξερεύνηση του διαστήματος. Ήταν ικανή να εκτελέσει πλήρως αυτοματοποιημένες πτήσεις, το 1988! Ο πύραυλος Energia ήταν πραγματικά τεράστιος και ο πιο ισχυρός της εποχής του. Δυστυχώς το Buran εκτέλεσε μόλις μια πτήση και το project ακυρώθηκε (παρά την επιτυχία της πτήσης) με την κατάρρευση της ΕΣΣΔ. Πλέον ότι έχει απομείνει από το πρόγραμμα βρίσκεται στην μέση της Καζάκικης στέπας, με τον χρόνο να αποσυνθέτει ό,τι θύμιζε τα μεγαλεπήβολα σχέδια του ανθρώπου για τα διαστημικά ταξίδια.
  19. 1 point
    https://meltdownattack.com/ Meltdown and Spectre Bugs in modern computers leak passwords and sensitive data. Meltdown and Spectre exploit critical vulnerabilities in modern processors. These hardware bugs allow programs to steal data which is currently processed on the computer. While programs are typically not permitted to read data from other programs, a malicious program can exploit Meltdown and Spectre to get hold of secrets stored in the memory of other running programs. This might include your passwords stored in a password manager or browser, your personal photos, emails, instant messages and even business-critical documents. Meltdown and Spectre work on personal computers, mobile devices, and in the cloud. Depending on the cloud provider's infrastructure, it might be possible to steal data from other customers. Meltdown Meltdown breaks the most fundamental isolation between user applications and the operating system. This attack allows a program to access the memory, and thus also the secrets, of other programs and the operating system. If your computer has a vulnerable processor and runs an unpatched operating system, it is not safe to work with sensitive information without the chance of leaking the information. This applies both to personal computers as well as cloud infrastructure. Luckily, there are software patches against Meltdown. Spectre Spectre breaks the isolation between different applications. It allows an attacker to trick error-free programs, which follow best practices, into leaking their secrets. In fact, the safety checks of said best practices actually increase the attack surface and may make applications more susceptible to Spectre Spectre is harder to exploit than Meltdown, but it is also harder to mitigate. However, it is possible to prevent specific known exploits based on Spectre through software patches.
  20. 1 point
    Red Hat has been made aware of multiple microarchitectural (hardware) implementation issues affecting many modern microprocessors, requiring updates to the Linux kernel, virtualization-related components, and/or in combination with a microcode update. An unprivileged attacker can use these flaws to bypass conventional memory security restrictions in order to gain read access to privileged memory that would otherwise be inaccessible. There are 3 known CVEs related to this issue in combination with Intel, AMD, and ARM architectures. Additional exploits for other architectures are also known to exist. These include IBM System Z, POWER8 (Big Endian and Little Endian), and POWER9 (Little Endian). Background Information An industry-wide issue was found with the manner in which many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. All three rely upon the fact that modern high performance microprocessors implement both speculative execution, and utilize VIPT (Virtually Indexed, Physically Tagged) level 1 data caches that may become allocated with data in the kernel virtual address space during such speculation. The first two variants abuse speculative execution to perform bounds-check bypass (CVE-2017-5753), or by utilizing branch target injection (CVE-2017-5715) to cause kernel code at an address under attacker control to execute speculatively. Collectively these are known as "Spectre". Both variants rely upon the presence of a precisely-defined instruction sequence in the privileged code, as well as the fact that memory accesses may cause allocation into the microprocessor’s level 1 data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use these two flaws to read privileged memory by conducting targeted cache side-channel attacks. These variants could be used not only to cross syscall boundary (variant 1 and variant 2) but also guest/host boundary (variant 2). The third variant (CVE-2017-5754) relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. Researchers have called this exploit "Meltdown". Subsequent memory accesses may cause an allocation into the L1 data cache even when they reference otherwise inaccessible memory locations. As a result, an unprivileged local attacker could read privileged (kernel space) memory (including arbitrary physical memory locations on a host) by conducting targeted cache side-channel attacks. https://access.redhat.com/security/vulnerabilities/speculativeexecution?sc_cid=701f2000000tsLNAAY&
  21. 1 point
    https://googleprojectzero.blogspot.gr/2018/01/reading-privileged-memory-with-side.html Tested Processors Intel(R) Xeon(R) CPU E5-1650 v3 @ 3.50GHz (called "Intel Haswell Xeon CPU" in the rest of this document) AMD FX(tm)-8320 Eight-Core Processor (called "AMD FX CPU" in the rest of this document) AMD PRO A8-9600 R7, 10 COMPUTE CORES 4C+6G (called "AMD PRO CPU" in the rest of this document) An ARM Cortex A57 core of a Google Nexus 5x phone [6] (called "ARM Cortex A57" in the rest of this document)
  22. 1 point
    A critical security vulnerability has been reported in phpMyAdmin—one of the most popular applications for managing the MySQL database—which could allow remote attackers to perform dangerous database operations just by tricking administrators into clicking a link. Discovered by an Indian security researcher, Ashutosh Barot, the vulnerability is a cross-site request forgery (CSRF) attack and affects phpMyAdmin versions 4.7.x (prior to 4.7.7). Cross-site request forgery vulnerability, also known as XSRF, is an attack wherein an attacker tricks an authenticated user into executing an unwanted action. According to an advisory released by phpMyAdmin, "by deceiving a user to click on a crafted URL, it is possible to perform harmful database operations such as deleting records, dropping/truncating tables, etc." phpMyAdmin is a free and open source administration tool for MySQL and MariaDB and is widely used to manage the database for websites created with WordPress, Joomla, and many other content management platforms. Moreover, a lot of hosting providers use phpMyAdmin to offer their customers a convenient way to organize their databases. Barot has also released a video, as shown above, demonstrating how a remote attacker can make database admins unknowingly delete (DROP) an entire table from the database just by tricking them into clicking a specially crafted link. "A feature of phpMyAdmin was using a GET request and after that POST request for Database operations such as DROP TABLE table_name; GET requests must be protected against CSRF attacks. In this case, POST requests were used which were sent through URL (for bookmarking purpose may be); it was possible for an attacker to trick a database admin into clicking a button and perform a drop table database query of the attacker’s choice." Barot explains in a blog post. However, performing this attack is not simple as it may sound. To prepare a CSRF attack URL, the attacker should be aware of the name of targeted database and table. "If a user executes a query on the database by clicking insert, DROP, etc. buttons, the URL will contain database name and table name," Barot says. "This vulnerability can result in the disclosure of sensitive information as the URL is stored at various places such as browser history, SIEM logs, Firewall Logs, ISP Logs, etc." Barot reported the vulnerability to phpMyAdmin developers, who confirmed his finding and released phpMyAdmin 4.7.7 to address this issue. So administrators are highly recommended to update their installations as soon as possible. https://thehackernews.com/2018/01/phpmyadmin-hack.html
  23. 1 point
    Version 4.2.3 of the IPS Community Suite is now available. This includes a security patch and we recommend you upgrade as soon as possible. 4.2.3 is a maintenance release that fixes issues identified in 4.2.2. Please note if you use https in the AdminCP, but not on the front-end, the auto-upgrade process may not work correctly. You should download this update from the client area and upgrade manually. Also included: 4.2.2 4.2.2 is a maintenance release that fixes issues identified in 4.2.1 and: A new extraction process to make auto-upgrades more robust The upgrade system will do a check of all files to ensure they are up to date before proceeding Security Notice This release also contains security enhancements to prevent possible XSS and increase protections on account management functions. It is recommended you upgrade to ensure the security on your Community. Thanks to @newbie LAC and Raja uzair Abdullah for reporting security issues. Version 4.2 is the next large release for Invision Community! We are very excited to introduce all the new features and improvements. Full information on 4.2.0 ... Also included: 4.2.1 Version 4.2 is the next large release for Invision Community! We are very excited to introduce all the new features and improvements. Full information on 4.2.0 ... 4.2.1 is a maintenance release to fix minor issues. Also included: 4.2.0 Version 4.2.0 is the next large release for Invision Community! We are very excited to introduce all the new features and improvements. Full information on 4.2.0 ...
×